GNU C library (glibc) vulnerability that has been referred to as GHOST affects DS8000
CVE(s): CVE-2015-0235
Affected product(s) and affected version(s):
All
Refer to the following reference URLs for...

Today during my session at InterConnect I got the opportunity to see customers from different backgrounds attending my session. Based on the great interchanges with the customers in the session it was apparent they were ready to take their new knowledge...

Small & Mid-Sized Businesses (SMBs) face similar challenges as an enterprise customer today. Everybody does backup but the real solution is how faster the backed up data can be recovered. On Day 3 of IBM InterConnect, one of our IBM Premiere Business...

There are so many situations in a consultant's life that can turn into a dilemma, like should I travel onsite or WFH this week? Stay at Marriott or Hilton? Early-morning call or late-night call with offshore? Carry IBM laptop or not? And the list is...

There are multiple vulnerabilities in IBM® Runtime Environment Javaâ„¢ Technology Edition, Version 6 and 7 that are used by IBM Sterling Connect:Direct File Agent. The issue was disclosed as part of the IBM Java SDK updates in October...

IBM InterConnect 2015 is kicking off in style in Las Vegas. Over 21000 attendees from across geographies have gathered to join this 4-day super exciting conference. Everyone in the conference having a great time meeting and networking with business and IT...

Due to its personalized and dynamic nature, marketing data has always been tricky to cache and invalidate. In this post I discuss the invalidation techniques that are available on each Fix Pack and Feature Pack levels.
The marketing caches
For...

IBM eDiscovery Manager should not be used to perform eDiscovery on content that is federated using IBM FileNet P8 Content Federated Services.
Holds applied to federated items in the master repository are not propagated to the source repository, so...

CERN is the European Organization for Nuclear Research located on the border of France in Geneva Switzerland is where physicists and engineers prob the fundamental structure of the universe. By leveraging the world's largest and most complex scientific...

Start a Blog

Starting a Blog
Blogs are online journals that you can use to share information, News and views. Within the ibm.com Connections community, all blogs (EXCEPT private Community Blogs) are public and they are indexed in Google. A blog can have multiple authors and a blog owner can add others as authors and enable moderation to review and approve entries and comments before they are published. An IBM ID is required to post blog entries and comments. If you do not have an IBM ID, register now.Who can own a blog?
Only an IBM regular employee can start a blog. The IBM blog owner can add IBM employees or non-IBM employees (business partners, clients, contractors, vendors) as authors. All blog owners and authors must comply with thecontent owner responsibilities. The IBM blog owner must ensure that all content contributors to his/her blog are aware of the responsibilities referenced above.
(IBM employees: You are required to review this Social computing education module before proceeding.)
Terms of Use
When contributing content (including, but not limited to text, images, links, videos), you must comply with the ibm.com Connections Terms of Use.br>
By clicking Continue, you agree to these ibm.com Connections Terms of Use.